Title: IRIS Biometric for Person Identification
1IRIS Biometric for Person
Identification
-
By -
Lakshmi Supriya.D -
M.Tech 04IT6002 -
Dept. of Information Technology
2- What are Biometrics?
- Why are Biometrics used?
- How Biometrics is today?
3Iris
- Iris is the area of the eye where the pigmented
or colored circle,usually brown, blue, rings the
dark pupil of the eye.
4 Example of iris
Normal Eye
5 Example of 10 Different People Iris
6Exciting Biometrics
- Fingerprint Recognition
- Voice Recognition
- Signature Recognition
- Face Recognition
- Palm Recognition
7Fingerprint Recognition
- This relies on the fact that a fingerprints
uniqueness can be defined by analyzing the
minutiae of a human being. - Two individuals having the same fingerprint is
less than one in a billion.
8Voice Recognition
- The person to be identified is usually pronounce
a designated password or phrase, which
facilitates the verification process. - But has the weakness of technology
9Signature Recognition
- This is done by analyzing the shape, speed,
stroke, pen pressure and timing information
during the act of signing. - Dynamic signature verification is a replacement.
10Face Recognition
- To identify any person we generally look at face
and eyes in particular seem to tell a story how
the person feels. - Face recognition is a kind of electronic unmasking
11Palm Recognition
- The image of the hand is collected and the
feature vectors are extracted and compared with
the database feature vectors.
12Iris Recognition systems
- The iris-scan process begins with a photograph. A
specialized camera, typically very close to the
subject, not more than three feet, uses an
infrared imager to illuminate the eye and capture
a very high-resolution photograph. This process
takes 1 to 2 seconds.
13Creating an Iris code
- The picture of eye first is processed by software
that localizes the inner and outer boundaries of
the iris. - And it is encoded by image-processing
technologies.
14Iris recognition
- In less than few seconds, even on a database of
millions of records, the iris code template
generated from a live image is compared to
previously enrolled ones to see if it matches to
any of them.
15Major characteristics of iris recognition
- Iris is thin membrane on the interior of the
eyeball. - Iris pattern remains unchanged after the age of
two and does not degrade overtime or with the
environment. - Iris patterns are extremely complex than other
biometric patterns
16Typical iris system configuration for taking a
picture
- An iris recognition camera takes a black and
white picture from 5 to 24 inches away. - The camera uses non-invasive, near-infrared
illumination that is barely visible and very
safe. - And this iris recognition cannot take place
without the person permission
17Example of iris recognition system
Gate device
Management device
reference
Register
Lan
18Typical iris system configuration
Uniform distribution
Stored templates
Reject
Pre processing
Feature-extraction
Identification Verification
Accept
Iris scan 2d image capture
Iris localization
Transform representation
comparison
enrolment
Authentication
19Techniques used
- Iris Localization
- Iris Normalization
- Image Enhancement
20Iris Localization
- Both the inner boundary and the outer boundary
of a typical iris can be taken as circles. But
the two circles are usually not co-centric.
Compared with the other part of the eye, the
pupil is much darker. We detect the inner
boundary between the pupil and the iris. The
outer boundary of the iris is more difficult to
detect because of the low contrast between the
two sides of the boundary. We detect the outer
boundary by maximizing changes of the perimeter-
normalized along the circle. The technique is
found to be efficient and effective.
21Iris Normalization
- The size of the pupil may change due to the
variation of the illumination and the associated
elastic deformations in the iris texture may
interface with the results of pattern matching.
For the purpose of accurate texture analysis, it
is necessary to compensate this deformation.
Since both the inner and outer boundaries of the
iris have been detected, it is easy to map the
iris ring to a rectangular block of texture of a
fixed size. -
22Image Enhancement
- The original image has low contrast and may have
non-uniform illumination caused by the position
of the light source. These may impair the result
of the texture analysis. We enhance the iris
image reduce the effect of non-uniform
illumination.
23Iris preprocessing (a) original eye (b) iris
localization ( c ) iris
normalization (d) image enhancement
24Comparison Of Iris Recognition With Other
Biometrics
- Accurate
- Stability
- Fast
- Scalable
25Comparison
MisIdentific--ation rate
Security
Applications
Method
Coded Pattern
1/1,200,000
Iris pattern
High
high-security
Iris
fingerprints
Fingerprint
Medium
1/1,000
Universal
Voice characteristics
voice
Low
1/30
Telephone service
Shape of letters, writing Order, pen pressure
Signature
Low
Low-security
1/100
Outline, shape distribution of eyes, nose
Face
Low
Low-security
1/100
size, length, thickness hands
Low
Palm
Low-security
1/700
26Analysis
27References
- Y.Zhu,T.Tan and Y.Wang,Biometric Identification
Based on Iris Pattern. - Anil K Jain,Biometric Authentication How Do I
Know Who You Are. - D Maltoni, D.Maio, Anil K Jain, and S
prabhakarHandbook of Finger print Recognition.